Font size:

Defensive Programming video collection

49 videos    $99.00
Title Author Info
Anticipating Errors Chuck Easttom 4 minutes
Buffer Overflows in C# Applications Chuck Easttom 3 minutes
Constraining User Input Chuck Easttom 5 minutes
Creating a Secure C# Application Chuck Easttom 7 minutes
Dealing with Bad Data Chuck Easttom 5 minutes
Defending against Path Traversal Attacks Chuck Easttom 5 minutes
Defensible Methods Chuck Easttom 4 minutes
Defensive Coding Defined Chuck Easttom 6 minutes
Dynamic SQL Chuck Easttom 5 minutes
Employing Iterative Design Chuck Easttom 4 minutes
Error Codes and Messages Chuck Easttom 5 minutes
Error Processing and Global Objects Chuck Easttom 5 minutes
Handling Errors Locally Chuck Easttom 4 minutes
If and Switch Statements Chuck Easttom 6 minutes
Injection Attacks in C# Applications Chuck Easttom 5 minutes
Low level Design Inspections Chuck Easttom 5 minutes
Method Parameters and Return Values Chuck Easttom 4 minutes
Path Traversal Problems Chuck Easttom 3 minutes
Potential Software Risks Chuck Easttom 5 minutes
Potential UI Application Risks Chuck Easttom 3 minutes
Potential XML Risks in ASP.NET Chuck Easttom 3 minutes
Pre and Post Conditions Chuck Easttom 4 minutes
Preventing Buffer Overflows Chuck Easttom 4 minutes
Preventing DLL Highjacking in .NET Applications Chuck Easttom 5 minutes
Preventing NTLM Attacks Chuck Easttom 3 minutes
Preventing Problems Before They Start Chuck Easttom 4 minutes
Unit Tests Chuck Easttom 5 minutes
Using Exceptions in C# Applications Chuck Easttom 5 minutes
Using Pseudocode Chuck Easttom 4 minutes
Using Regular Expressions Chuck Easttom 4 minutes
Utilizing Exceptions Chuck Easttom 6 minutes
Validating Input Chuck Easttom 5 minutes
Verifying Service Identities Chuck Easttom 4 minutes
WCF and Authentication Chuck Easttom 5 minutes
What is Clean Code Chuck Easttom 5 minutes
Why Do Risks Exist? Chuck Easttom 3 minutes
Windows Shatter Attacks Chuck Easttom 3 minutes
Working with WindowsIdentity Chuck Easttom 5 minutes
Writing Testable Code Chuck Easttom 5 minutes
Assertions Chuck Easttom 3 minutes
Introduction to Testing Chuck Easttom 5 minutes
Stored Procedures Chuck Easttom 4 minutes
SQL Injection Attacks Chuck Easttom 4 minutes
The Value of null Chuck Easttom 3 minutes
Creating Clean Testable Code Chuck Easttom 7 minutes
Mitigating Injection Attacks Chuck Easttom 4 minutes
Variables Chuck Easttom 5 minutes
XML Entity Expansion Attacks Chuck Easttom 3 minutes
Error Handling Chuck Easttom 4 minutes
Register Now
Defensive Programming video collection
  • Course ID:
    263028
  • Duration:
    n/a
  • Price:
    $99